Rising To The Challenge Of A Mobile Workforce

The growing movement towards “bring your own device” (BYOD) is causing headaches for companies looking to secure their networks, but far from introducing blanket bans, organisations should be looking to reassess their strategies for working with this new trend.

Embracing change

The consumer market will always be ahead of the corporate market when it comes to adopting new technologies – whether they be smartphones, tablets or the next big thing – and there are important benefits to companies allowing their staff to connect to their networks using their own devices. These range from increased productivity from using devices with which they’re comfortable, to procurement spending less re-equipping employees who are generally upgrading themselves. There’s also an argument that staff morale will improve because they can use their gadget of choice.

While those controlling network access – from business owners to security officers – may break out in a sweat at the thought of having to manage all these devices securely and protecting the integrity of their own systems, the secret is to control their usage through education and understanding. This is as big a problem at SME level as it is for enterprise managers.

According to a survey published last year by Juniper Networks, more than half of mobile device users are accessing employer networks without permission, and the majority of them do not follow the company’s security procedures. The best way to avoid security issues through incidences like these is by educating staff and setting out a clear mobile device policy – which too many companies still do not have. Without this type of policy in place, companies are simply inviting disaster.

Also, the problem is not just about protecting critical systems from being accessed by unauthorised devices, but about how data on those mobile devices is protected. Although people are using their own devices to access company information they often have a very different view of security and they certainly do not regard the loss or theft of a smartphone with the same level of alarm as they would with a laptop – despite the fact that many smartphones now have similar capabilities to laptops. Again this is a case of education and of setting out clear policies.

Page: 1 2

adminuk

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

15 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

17 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

19 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

1 day ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

2 days ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

2 days ago